Episodes
Tuesday Jun 13, 2023
NCF-329 API Marketplace and business opportunities
Tuesday Jun 13, 2023
Tuesday Jun 13, 2023
Welcome back to NewCyberFrontier. In this video, we have guest Patrick Clawson CEO of an API Security Platform Called Resurface Labs. Mr. Clawson has extensive knowledge of Cybersecurity with twenty-plus years of experience. In this episode, we will review API modules and how only 11% are in the marketplace, leaving a gap for encrypted security. We will also be addressing how to start up a business in the cybersecurity world. Starting up a business, Patrick Clawson comes in for growth and focuses on four successful initiatives. "Usually, I reach out to financial and Industrial analyses to get their view on the matter. The third thing I do is Intensive Competitive Research, getting everybody's verdicts worldwide, big or small. The last step is building out the pricing strategy and competitive advantages and contacting buyers to make it relevant. Tune in to today's episode. Thank you.
Monday Jun 05, 2023
NCF-328 How fast is the Cloud Migration Moving
Monday Jun 05, 2023
Monday Jun 05, 2023
On today's show, Fausto Lendeborg and Tim discuss Cloud Platforms, Cloud migration, the speed of business objectives, and the organization's perspective. Fausto is the Co-Founder and CEO of Secberus, a Cloud Security Governance Platform designed to manage cloud risk at scale. With over 20 years of experience in cybersecurity, Fausto has been an integral part of multiple successful ventures, including Prolexic and Zenedge; Fausto now focuses on sharing his cloud governance, Security, and compliance knowledge in the modern as-code environment. CISOs have a hold on the trending change and know how to use and secure cloud ecosystems for the organization's benefit. The idea of the Cloud has taken off and is now one of the top IT skills needed in today's business markets. So how is Security standing up and taking charge of the Cloud security and its virtual ecosystems?
Secberus Website
Secberus - Assess, understand and manage cloud infrastructure drift at enterprise scale.
Visit our sponsors:
Monday May 15, 2023
NCF-326 Cybersecurity Research
Monday May 15, 2023
Monday May 15, 2023
Welcome back to the show! Today we have guest Amit Serper Director of Security Research at Sternum. At Sternum, Mr. Serper is tasked with researching hardware or "Hardware Hacking," where he takes apart specific devices to gain access to them. Mr. Serpers say's, "Our approach to security at Sternum is, we know those devices are vulnerable for various reasons, but when developers write the code, we know they do not have security in mind. Our job is to understand the vulnerability that is on these devices." Security structures are not up to date on most devices, causing exploitation or vulnerability. Join in today's Episode of NewCyberFrontier.
Visit our sponsors:
Monday Apr 24, 2023
NCF-325 Security as a Business Value Proposition
Monday Apr 24, 2023
Monday Apr 24, 2023
Welcome back to the show! Our Guest, Justin Beals, CEO and co-founder at Strike Graph, a 20+ year veteran, Background in Telco, and four different startups. Today we talk about a new era of turning security tools into a business value proposition, turning the advertising of security posture into marketing goods and services. Tune into this week's podcast episode.
Visit our sponsors:
Monday Apr 17, 2023
NCF-324 Cybersecurity for Everyone
Monday Apr 17, 2023
Monday Apr 17, 2023
I hope everyone enjoyed the break! In today's episode, we have guest Scott Schober, President and CEO of Berkeley Varitronics Systems and a Cyber Expert who has published three books on Cybersecurity. Mr. Schober has had multiple altercations with getting hacked and has extensive knowledge of this matter, saying, "I call it the Digital footprint; the more you put out there about yourself, your whereabouts, your likes, it creates a digital profile about you which leaves a trail of breadcrumbs about you"(Schober.) One may think this is not a massive deal at the time, but as the information you leave behind becomes more extensive, this leads more of a target on your back to getting hacked or worse. You can control what you see on the internet and your phone, for example, "Say you look up or go buy a pregnancy test at the store; in the following weeks, you will see various ads and promos on your phone about subjects related to pregnancy tests, babies, etc." (Gorog.) This is an interesting and almost eerie subject to discuss because your phone can decide what you see based on your searches and interests. Go check out more on Scott Schober! Here is his website www.ScottSchober.com
Visit our sponsors:
Monday Apr 03, 2023
NCF-323 Psychology of Trust Digitally
Monday Apr 03, 2023
Monday Apr 03, 2023
Welcome back to the show! In today's episode, we are accompanied by host Tim Montgomery and guest Chris Gorog, the CEO of Blockframe, a Blockchain company that uses Blockchain technology for privacy. In this episode, we will review the relationship of trust within the Internet, Cybersecurity, and the CIA. With millions of people, systems, and devices, we must have an efficient method to understand trust digitally. A mystery is where "We have to trust millions of devices without a human attachment to them; this is where trust becomes the most important and is yet mostly unsolved." (Chris Gorog.) To unpack and understand this, we will first look at the behavior of the human aspect of trust and how trust affects our Psychology.
Visit our sponsors:
Monday Mar 27, 2023
NCF-322 Critical infrastructure of Zero Trust
Monday Mar 27, 2023
Monday Mar 27, 2023
Write Up Welcome back to the show; today our host, Tim Montgomery, presents us with the release of the Executive Order of Cybersecurity and Critical infrastructure of Zero Trust. "Within agencies, they refer to zero trust to provide collections of concepts and ideas to minimize uncertainty, inforcing accuracy per request of access to information." (Montgomery.) Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic? Tune in to the episode of NewCyberFrontier.
Visit our sponsors:
Thursday Mar 23, 2023
NCF-321 Part 2 of Zero Trust
Thursday Mar 23, 2023
Thursday Mar 23, 2023
Welcome back to the show. We are continuing our series of Zero Trust where we take interviews and get people's impressions at the Rocky Mountain Cyberspace symposium. Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Enjoy this episode of NewCyberFrontier
Visit our sponsors:
Monday Mar 13, 2023
NCF-320 Zero Trust
Monday Mar 13, 2023
Monday Mar 13, 2023
Welcome back to the show. Today we have our three hosts, Tim Montgomery, Chris Gorog, and Dr. Shawn Murray, going over "Zero Trust." Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Dr. Shawn Murray Defines these five pillars as "This is a Cybersecurity paradigm focused on resources, protection, and the premise trust is never granted implicitly." (Dr. Murray) Stay tuned for the other half of this episode, where we take interviews and get people's impressions on Zero trust at the Rocky Mountain Cyberspace symposium. Enjoy today's episode.
Visit our sponsors:
Monday Mar 06, 2023
NCF-319 Cloud Security with Kubernetes
Monday Mar 06, 2023
Monday Mar 06, 2023
Today's NewCyberFrontier, guest Dr. Brian Smith, has founded several companies, TippingPoint Technologies Click Security, and most recently Spyderbat. Spyderbat is pioneer in cloud security using “Kubernetes which they believe is the latest step in the evolution of cloud” ( Brian Smith.) Kubernetes use short life cycle cloud containers monitoring the behavior of the container to determine when malicious activity might be enacted. The pretense is, by knowing the normal behavior we can spot the abnormal operations and thus the malicious activity. “Kubernetes have allowed us to change how we think about security systems.” (Brian Smith.) In the past, we try to detect viruses and malware threats and prevent them the best way we could, but there might just be a better way to secure software better than we thought. Tune in to today's episode of NewCyberFrontier, and check out today’s sponsor https://www.spyderbat.com
Visit our sponsors: